HP JetAdvantage Security Manager 10 Device E-LTU Manual de usuario Pagina 7

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 31
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 6
The form itself can take time to complete and is prone to error especially when completing many times
over. The Common Name will be either an IP Address or hostname, and whatever is chosen must be
used when attempting to communicate to the device using the certificate. Once the form is complete,
a private key is stored on the device, and the certificate request (CSR) is saved to file and delivered to
the Certificate Authority (CA). The CA takes the request and generates the certificate. This may be
automatically created or may require administrator intervention to process the request depending
upon how the CA was setup. Now the certificate is retrieved and imported into the browser assuming
the user has not navigated off the EWS page where the CSR was generated. A new radio button to
Install certificate should now be present on the Certificate Options page. If it is not, that means EWS
was navigated away from this page or EWS timed out waiting for input, which means the whole
process needs to start over again. If Install certificate does appear, check that button, proceed to
browse to where the certificate resides and install it. Imagine performing these steps over and over
again for a fleet of devices and it is likely the first attempt to perform this on a fleet will be the last.
USING SECURITY MANAGER TO MANAGE IDENTITY
CERTIFICATES
Now there is a tool (Security Manager) that can not only eliminate the tedious manual task of
installing certificates one at a time using EWS but also manages the certificates on the fleet to replace
them before expiration or in cases where they have been revoked or deleted. The benefits of using a
solution such as Security Manager to install certificates instead of EWS include:
Remediation is a ~1-2 minute per device “background” process vs a 15-20 minute highly
interactive, error prone, scheduled process.
Automatically assesses for missing, invalid, expired and
revoked certificates. Remediates as necessary.
Security Manager can create a CSR that the device can’t create (encryption algorithm/key
length).
Security Manager uses device database information to allow certificate based connection via
IP address or hostname.
Vista de pagina 6
1 2 3 4 5 6 7 8 9 10 11 12 ... 30 31

Comentarios a estos manuales

Sin comentarios